[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [cobalt-users] BIND vulnerability



> -----Original Message-----
> From: cobalt-users-admin@xxxxxxxxxxxxxxx
> [mailto:cobalt-users-admin@xxxxxxxxxxxxxxx]On Behalf Of Dom Latter
> Sent: Tuesday, January 30, 2001 3:09 PM
> To: cobalt-users@xxxxxxxxxxxxxxx
> Subject: RE: [cobalt-users] BIND vulnerability
> 
> 
> > How do I check my Raq2 running redhat 2.0 for the BIND 
> > version and 
> 
> "locate bind | less" on my Qube brings up 
> /home/packages/bind-4.9.5p1-3.mips.rpm
> for example.
> 
> NB that the process is called "named" : try 
> "ps aux | grep named".
> then "which named" to see which one you're running. 
> 
> Then "strings /usr/sbin/named | grep 4.9" which 
> rather looks like it's actually 4.9.7.
> 
> > how do I update it?
> 
> Wait for Cobalt to release a patch, wait for them 
> to withdraw it, wait for them to re-release it 
> once they've fixed the bugs?
> 
> But seriously, I'd say that us MIPSen are at less  
> risk of compromise than the Intel users.

See http://www.isc.org/products/BIND/bind-security.html There is a matrix of
which versions of Bind have which bugs. There is *nowhere* any reference to
the used platform (Intel of MIPS), so I think *everybody* should upgrade as
fast as possible.

Seriously, I think we can expect a lot of exploits on older Bind versions
soon....